搜索结果: 1-8 共查到“密码学 Information Leakage”相关记录8条 . 查询时间(0.069 秒)
Backward Private DSSE: Alternative Formulations of Information Leakage and Efficient Constructions
Dynamic Searchable Symmetric Encryption Backward Privacy Forward Privacy
2019/5/9
Dynamic Searchable Symmetric Encryption (DSSEDSSE), apart from providing support for search operation, allows a client to perform update operations on outsourced database efficiently. Two security pro...
TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices
side channel attack cache TrustZone
2016/12/8
As smart, embedded devices are increasingly integrated into our daily life, the security of these devices has become a major concern. The ARM processor family, which powers more than 60% of embedded d...
A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks
Information leakage amount side-channel security power analysis attack
2016/3/18
To design effective countermeasures for cryptosystems against side-channel power analysis attacks, the evaluation of the system leakage has to be lightweight and often times at the early stage like on...
Cryptology ePrint Archive: Report 2011/099Can Code Polymorphism Limit Information Leakage?
cryptographic protocols / side channels polymorphism
2011/3/10
In addition to its usual complexity assumptions, cryptography silently assumes that information can be physically protected in a single location. As one can easily imagine, real-life devices are not i...
Can Code Polymorphism Limit Information Leakage
cryptographic protocols / side channels polymorphism
2012/3/29
In addition to its usual complexity assumptions, cryptography silently assumes that information can be physically protected in a single location. As one can easily imagine, real-life devices are not i...
Exponential Bounds for Information Leakage in Unknown-Message Side-Channel Attacks
Side Channel Attacks Information Theory
2010/7/14
In Backes&Kopf(2008), the authors introduced an important new information theoretic numerical measure for assessing a system's resistance to unknown-message side-channel attacks and computed a formula...
Information Leakage in Optimal Anonymized and Diversified Data
Data dissemination Privacy-preserving k-anonymity
2009/6/5
To reconcile the demand of information dissemination and
preservation of privacy, a popular approach generalizes the attribute val-
ues in the dataset, for example by dropping the last digit of the ...
Information Leakage of Flip-Flops in DPA-Resistant Logic Styles
Information Leakage Flip-Flops DPA-Resistant Logic Styles
2009/6/4
This contribution discusses the information leakage of flipflops
for different DPA-resistant logic styles. We show that many of the
proposed side-channel resistant logic styles still employ flip-flo...